Acknowledgement
Supported by : 가톨릭관동대학교
References
- S. M. Chun, J. Y. Choi and J. T. Park, Mobile Healthcare System for Personalized Emergency Management, Journal of the Intitute of Electronics and Information Engieers. (2014) Vol.51, No.6, pp.1178-1187
- B. K. Lee and E. H. Joeng, A Design of Cloud based Health Data Access Scheme for Patient's Information Management on Medical Sensor Network Environment, Proceedings of the Conference, Korea Society of Industiral Information System, (2014), November 21; Seoul, Korea.
- R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models, IEEE Computer, (1996), Vol.29, No.2, pp.38-47.
- H. J. Mun, K. S. Kim, N. K. Um, Y. Z. Li and S. H. Lee, Effective Access Control Mechanism for Protection of Sensitive Personal Information, Journal of the Korean institute of communication science. (2007), Vol. 32, No.7, pp.667-673
- http://directory.apache.org/fortress/user-guide/1-intro-rbac.html, September 05 (2015).
- H. J. Kim and H. H. Park, An Elliptic Curve Cryptosystem based on Trust and RBAC to Reduce Security Overhead in Sensor Networks, KIPS Transaction on Software and Data Engineering. (2012), Vol.2, No.11, pp.747-756. https://doi.org/10.3745/KTSDE.2013.2.11.747
Cited by
- OAuth 2.0 위임 Token을 이용한 환자정보 전달 시스템 vol.30, pp.6, 2016, https://doi.org/10.13089/jkiisc.2020.30.6.1103